Vol. 55, No. 7, 2021
Estimation of Distribution of Node-to-Node Path Lengths in the Global Network
p. 589 abstract
On a Segment Partition for Entropy Estimation
p. 601 abstract
Modern Approaches to Detecting and Classifying Toxic Comments Using Neural Networks
p. 607 abstract
Parallel Algorithm for Solving the Graph Isomorphism Problem
p. 617 abstract
Markov Model of Nonmutually Exclusive Cyberthreats and Its Applications for Selecting an Optimal Set of Information Security Tools
p. 623 abstract
Dynamically Changing Parallelism with Asynchronous Sequential Data Flows
p. 636 abstract
Method for Joint Clustering in Graph and Correlation Spaces
p. 647 abstract
Research and Development of an Algorithm for Response Time Estimation in Multiprocessor Systems under Interval Uncertainty of Task Execution Times
p. 658 abstract
Efficient Equivalence Checking Technique for Some Classes of Finite-State Machines
p. 670 abstract
On the Existence Problem of Finite Bases of Identities in the Algebras of Recursive Functions
p. 702 abstract
Application of Convolutional Neural Networks for Recognizing Long Structural Elements of Rails in Eddy Current Defectograms
p. 712 abstract
Features of the Algorithmic Implementation of Difference Analogs of the Delayed Logistic Equation
p. 723 abstract
Generalization of Derivation Rules for Join Dependencies in Database
p. 731 abstract
Deriving Homing Sequences for Finite State Machines with Timed Guards
p. 738 abstract
On the Modeling of Sequential Reactive Systems by Means of Real Time Automata
p. 751 abstract
A Temporal Logic for Programmable Logic Controllers
p. 763 abstract
On the Model Checking Problem for Some Extension of CTL*
p. 776 abstract
Knowledge-Based Algorithms for BDI Agents
p. 786 abstract
On the Properties of Algebraic Geometric Codes as Copy Protection Codes
p. 795 abstract
Hierarchical Clustering as a Dimension Reduction Technique in the Markowitz Portfolio Optimization Problem
p. 809 abstract
The Branch-and-Bound Algorithm for the Traveling Salesman Problem is Not a Direct Algorithm
p. 816 abstract
On the Detection of Exploitation of Vulnerabilities That Leads to the Execution of a Malicious Code
p. 827 abstract
On a Mechanism for the Formation of Spatially Inhomogeneous Structures of Light Waves in Optical Information Transmission Systems
p. 838 abstract
VTMine for Visio: A Graphical Tool for Modeling in Process Mining
p. 847 abstract
Automated Search and Analysis of the Stylometric Features That Describe the Style of the Prose of 19th–21st Centuries
p. 866 abstract
Features of the Computational Implementation of the Algorithm for Estimating the Lyapunov Exponents of Systems with Delay
p. 877 abstract
The “One-Fifth Rule” with Rollbacks for Self-Adjustment of the Population Size in the (1 + (λ, λ)) Genetic Algorithm
p. 885 abstract